VAR-201101-0011
Vulnerability from variot - Updated: 2025-04-11 23:17The administrative interface on the PolyVision RoomWizard with firmware 3.2.3 places the Sync Connector Active Directory (AD) credentials in a web form that is accessed over HTTP on port 80, which allows remote attackers to obtain sensitive information by reading the HTML source code corresponding to the /admin/sign/DeviceSynch URI. The PolyVision RoomWizard web based scheduling system with touch screen display contains two vulnerabilities that allow an unauthorized user to access the device console and Sync Connector Active Directory credentials. PolyVision RoomWizard In some cases, a remote third party accesses the admin interface, Active Directory You may be able to obtain your credentials. PolyVision RoomWizard Is a web-based conference room reservation system. Sync Connector Is RoomWizard But, Microsoft Windows Actitve Directory (AD) Environmental Microsoft Exchange This is a function for linking with. PolyVision RoomWizard The admin interface for Sync Connector Used by Active Directory Is vulnerable to a password leak. Also, PolyVision RoomWizard To HTTP Factory settings for administrative account information for access via the Internet may be obtained by a third party.By a remote third party, AD Your credentials could be stolen. Also, the settings of this product may be changed. RoomWizard is prone to a security-bypass vulnerability and an information-disclosure vulnerability. Successful exploiting these issues allow attackers to gain access to the application; other attacks may also be possible
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201101-0011",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "roomwizard",
"scope": "eq",
"trust": 1.6,
"vendor": "polyvision",
"version": "3.2.3"
},
{
"model": "roomwizard",
"scope": "eq",
"trust": 1.0,
"vendor": "polyvision",
"version": "*"
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "polyvision",
"version": null
},
{
"model": "roomwizard",
"scope": "eq",
"trust": 0.8,
"vendor": "polyvision",
"version": "version 3.2.3"
},
{
"model": "media link roomwizard",
"scope": "eq",
"trust": 0.3,
"vendor": "interactive",
"version": "0"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#870601"
},
{
"db": "BID",
"id": "45699"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-001024"
},
{
"db": "CNNVD",
"id": "CNNVD-201101-129"
},
{
"db": "NVD",
"id": "CVE-2010-0214"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:polyvision:roomwizard_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2011-001024"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Sean Lam",
"sources": [
{
"db": "BID",
"id": "45699"
},
{
"db": "CNNVD",
"id": "CNNVD-201101-129"
}
],
"trust": 0.9
},
"cve": "CVE-2010-0214",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CVE-2010-0214",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "VHN-42819",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2010-0214",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "CARNEGIE MELLON",
"id": "VU#870601",
"trust": 0.8,
"value": "1.26"
},
{
"author": "NVD",
"id": "CVE-2010-0214",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNNVD",
"id": "CNNVD-201101-129",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULHUB",
"id": "VHN-42819",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#870601"
},
{
"db": "VULHUB",
"id": "VHN-42819"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-001024"
},
{
"db": "CNNVD",
"id": "CNNVD-201101-129"
},
{
"db": "NVD",
"id": "CVE-2010-0214"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The administrative interface on the PolyVision RoomWizard with firmware 3.2.3 places the Sync Connector Active Directory (AD) credentials in a web form that is accessed over HTTP on port 80, which allows remote attackers to obtain sensitive information by reading the HTML source code corresponding to the /admin/sign/DeviceSynch URI. The PolyVision RoomWizard web based scheduling system with touch screen display contains two vulnerabilities that allow an unauthorized user to access the device console and Sync Connector Active Directory credentials. PolyVision RoomWizard In some cases, a remote third party accesses the admin interface, Active Directory You may be able to obtain your credentials. PolyVision RoomWizard Is a web-based conference room reservation system. Sync Connector Is RoomWizard But, Microsoft Windows Actitve Directory (AD) Environmental Microsoft Exchange This is a function for linking with. PolyVision RoomWizard The admin interface for Sync Connector Used by Active Directory Is vulnerable to a password leak. Also, PolyVision RoomWizard To HTTP Factory settings for administrative account information for access via the Internet may be obtained by a third party.By a remote third party, AD Your credentials could be stolen. Also, the settings of this product may be changed. RoomWizard is prone to a security-bypass vulnerability and an information-disclosure vulnerability. \nSuccessful exploiting these issues allow attackers to gain access to the application; other attacks may also be possible",
"sources": [
{
"db": "NVD",
"id": "CVE-2010-0214"
},
{
"db": "CERT/CC",
"id": "VU#870601"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-001024"
},
{
"db": "BID",
"id": "45699"
},
{
"db": "VULHUB",
"id": "VHN-42819"
}
],
"trust": 2.7
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#870601",
"trust": 3.6
},
{
"db": "NVD",
"id": "CVE-2010-0214",
"trust": 2.8
},
{
"db": "BID",
"id": "45699",
"trust": 2.8
},
{
"db": "VUPEN",
"id": "ADV-2011-0059",
"trust": 2.5
},
{
"db": "PACKETSTORM",
"id": "97291",
"trust": 1.7
},
{
"db": "XF",
"id": "64543",
"trust": 1.4
},
{
"db": "JVNDB",
"id": "JVNDB-2011-001024",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201101-129",
"trust": 0.7
},
{
"db": "FULLDISC",
"id": "20110106 ROOMWIZARD DEFAULT PASSWORD AND SYNC CONNECTOR CREDENTIAL LEAK [CVE-2010-0214]",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-42819",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#870601"
},
{
"db": "VULHUB",
"id": "VHN-42819"
},
{
"db": "BID",
"id": "45699"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-001024"
},
{
"db": "CNNVD",
"id": "CNNVD-201101-129"
},
{
"db": "NVD",
"id": "CVE-2010-0214"
}
]
},
"id": "VAR-201101-0011",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-42819"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-11T23:17:56.164000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Steelcase RoomWizard System Download",
"trust": 0.8,
"url": "http://steelcase.polyvision.com/support/downloads-roomwiz.asp"
},
{
"title": "RWFirmware",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=36140"
},
{
"title": "RW10Firmware",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=36139"
},
{
"title": "Pre-upgrade",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=36138"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2011-001024"
},
{
"db": "CNNVD",
"id": "CNNVD-201101-129"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-200",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-42819"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-001024"
},
{
"db": "NVD",
"id": "CVE-2010-0214"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.8,
"url": "http://www.kb.cert.org/vuls/id/870601"
},
{
"trust": 2.5,
"url": "http://www.securityfocus.com/bid/45699"
},
{
"trust": 2.5,
"url": "http://www.vupen.com/english/advisories/2011/0059"
},
{
"trust": 2.0,
"url": "http://seclists.org/fulldisclosure/2011/jan/58"
},
{
"trust": 1.7,
"url": "http://packetstormsecurity.org/files/view/97291/roomwizard-disclose.txt"
},
{
"trust": 1.4,
"url": "http://xforce.iss.net/xforce/xfdb/64543"
},
{
"trust": 1.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/64543"
},
{
"trust": 0.8,
"url": "about vulnerability notes"
},
{
"trust": 0.8,
"url": "contact us about this vulnerability"
},
{
"trust": 0.8,
"url": "provide a vendor statement"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0214"
},
{
"trust": 0.8,
"url": "http://jvn.jp/cert/jvnvu870601"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-0214"
},
{
"trust": 0.3,
"url": "http://www.interactivemedialink.com.au/products/input-devices/196-roomwizard-room-scheduling-system.html"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#870601"
},
{
"db": "VULHUB",
"id": "VHN-42819"
},
{
"db": "BID",
"id": "45699"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-001024"
},
{
"db": "CNNVD",
"id": "CNNVD-201101-129"
},
{
"db": "NVD",
"id": "CVE-2010-0214"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#870601"
},
{
"db": "VULHUB",
"id": "VHN-42819"
},
{
"db": "BID",
"id": "45699"
},
{
"db": "JVNDB",
"id": "JVNDB-2011-001024"
},
{
"db": "CNNVD",
"id": "CNNVD-201101-129"
},
{
"db": "NVD",
"id": "CVE-2010-0214"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2011-01-07T00:00:00",
"db": "CERT/CC",
"id": "VU#870601"
},
{
"date": "2011-01-12T00:00:00",
"db": "VULHUB",
"id": "VHN-42819"
},
{
"date": "2011-01-06T00:00:00",
"db": "BID",
"id": "45699"
},
{
"date": "2011-02-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2011-001024"
},
{
"date": "2011-01-13T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201101-129"
},
{
"date": "2011-01-12T01:00:01.183000",
"db": "NVD",
"id": "CVE-2010-0214"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2011-01-07T00:00:00",
"db": "CERT/CC",
"id": "VU#870601"
},
{
"date": "2017-08-17T00:00:00",
"db": "VULHUB",
"id": "VHN-42819"
},
{
"date": "2015-04-13T21:05:00",
"db": "BID",
"id": "45699"
},
{
"date": "2011-02-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2011-001024"
},
{
"date": "2011-01-13T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201101-129"
},
{
"date": "2025-04-11T00:51:21.963000",
"db": "NVD",
"id": "CVE-2010-0214"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201101-129"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "PolyVision RoomWizard insecurely stores Sync Connector Active Directory credentials and uses default administrative password",
"sources": [
{
"db": "CERT/CC",
"id": "VU#870601"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "information disclosure",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201101-129"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.